{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:23:29Z","timestamp":1771662209263,"version":"3.50.1"},"reference-count":19,"publisher":"Zhejiang University Press","issue":"6","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472447"],"award-info":[{"award-number":["61472447"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802435"],"award-info":[{"award-number":["61802435"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["springerlink.com","jzus.zju.edu.cn"],"crossmark-restriction":true},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1631\/fitee.1800523","type":"journal-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T06:14:24Z","timestamp":1562652864000},"page":"801-815","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Malware homology identification based on a gene perspective"],"prefix":"10.1631","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5948-9195","authenticated-orcid":false,"given":"Bing-lin","family":"Zhao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zheng","family":"Shan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fu-dong","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bo","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yi-hang","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wen-jie","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"635","published-online":{"date-parts":[[2019,7,9]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2523514.2527006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/aina.2014.59"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2012.65"},{"key":"ref4","first-page":"3837","article-title":"Convolutional neural networks on graphs with fast localized spectral filtering","volume-title":"Conf and Workshop on Neural Information Processing Systems","author":"Defferrard","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/spw.2016.30"},{"key":"ref6","first-page":"17","article-title":"Analyzing and recognizing Android malware via semantic-based malware gene","volume-title":"Int Conf on Cyber-Enabled Distributed Computing and Knowledge Discovery","author":"Han","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579364"},{"key":"ref8","volume-title":"Microsoft Malware Classification Challenge (Big 2015)","year":"2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0151-y"},{"key":"ref10","volume-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf","year":"2016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813642"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1601325"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2469253"},{"issue":"10","key":"ref14","first-page":"2410","article-title":"An automatic malware homology identification method based on calling habits","volume":"44","author":"Qiao","year":"2016","journal-title":"Acta Electron Sin"},{"key":"ref15","volume-title":"Ransomware Threat Situation Analysis Report","year":"2017"},{"key":"ref16","volume-title":"Microsoft Malware Classification Challenge (Big 2015) first place team: say no to overfitting","author":"Wang","year":"2015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2018.2799000"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2870294"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1601745"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1800523.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1800523\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1800523.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:46:05Z","timestamp":1771659965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1800523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["1392"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1800523","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6]]},"assertion":[{"value":"http:\/\/orcid.org\/0000-0001-5948-9195","URL":"http","order":0,"name":"name","label":"Bing-lin ZHAO","group":{"name":"orcid","label":"ORCID"}},{"value":"2018-08-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-06-11","order":2,"name":"crosschecked","label":"Crosschecked","group":{"name":"publication_history","label":"Publication History"}},{"value":"Article","order":0,"name":"content_type","group":{"name":"content_type","label":"Content Type"}},{"value":"\u00a9 Zhejiang University and Springer-Verlag GmbH Germany, part of Springer Nature 2019","order":0,"name":"copyright","group":{"name":"copyright","label":"Copyright"}}]}}